14 research outputs found

    Field programmable gate array (FPGA) implementation of novel complex PN-code-generator- based data scrambler and descrambler

    Get PDF
    A novel technique for the generation of complex and lengthy code sequences using low- length linear feedback shift registers (LFSRs) for data scrambling and descrambling is proposed. The scheme has been implemented using VHSIC hardware description language (VHDL) approach which allows the reconfigurability of the proposed system such that the length of the generated sequences can be changed as per the security requirements. In the present design consideration the power consumption and chip area requirements are small and the operating speed is high compared to conventional discrete I.C. design, which is a pre-requisite for any system designer. The design has been synthesised on device EP2S15F484C3 of Straitx II FPGA family, using Quarts Altera version 8.1. The simulation results have been found satisfactory and are in conformity with the theoretical observations

    High Capacity Data Embedding using joint Intermediate Significant Bit (ISB) and Least Significant Bit (LSB) Technique

    Get PDF
    The success of the Internet, coupled with availability of relatively inexpensive digital devices has created an environment in which it has become very easy to obtain, replicate and distribute digital content without any loss in quality. In such a scenario, data hiding has received significant attention from the research community round the globe, as it has been found useful in various areas like copyright protection, copy control, fingerprinting, content authentication and information security. Least Significant Bit based data hiding techniques have been used as effective means to hide the data to be secured, but they are less robust in nature. This paper presents a high capacity data hiding technique in which the data to be secured is embedded in Intermediate Significant Bits in addition to Least Significant Bits of cover image. The data to be embedded is broken down in data blocks of variable length and each block is embedded in the cover media in such a way that highest length data vector is embedded in lower order bit plane and vice-versa. This work shows attractive results with respect to imperceptibility and capacity when compared with a few reported techniques. Key Words: Intermediate Significant Bit, Embedding, Imperceptibility, Least Significant Bit.

    On the Realization of Non-Linear Pseudo-Noise Generator for various Signal Processing and Communication Applications

    Get PDF
    In digital communication systems and digital signal processing, the design of pseudo-noise (PN) sequences having good correlation properties has been one of the most important development steps. Its well-known application areas include spread spectrum communications, Multiuser Communications, Digital Signal Processing for reduction of power spectral density, mitigation of Multiple Access Interference (MAI) and improvement of signal to noise ratio (SNR) respectively. In this paper a performance of non- linear PN code generator for interference rejection improvement of signal to noise ratio in signal processing applications have been studied.  The signal of interest can be considered to be a digitally controlled wide band digital chaotic signal, which has been implemented by conventional PN code generators.  The proposed technique can be used as an alternative code for improvement in signal to noise ratio, interference rejection, spreading code for various signal processing and communication applications.  The proposed scheme has been implemented using matlab as a simulation tool.  Power spectral density, auto-correlation and cross-correlation property have been thoroughly studied and has been compared with conventional scheme and are presented in the paper. Keywords: PN Code Generator, Spread Spectrum Modulation, Auto-correlation, Cross-correlation, Power Spectral Density

    Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication

    Get PDF
    A high capacity data hiding technique using color images as cover medium and referred to as 4R-4G-4B technique has been investigated and presented in this paper. The color image is firstly divided into its constituent bit planes followed by data embedding. To thwart the adversary different embedding algorithms have been used for embedding data in Red, Green and Blue planes. Additional layer of security to the embedded data is added by embedding secret data at the pseudorandom locations determined by Main Address Vector (MAV) and Complementary Address Vector (CAV). The comparison of our method with an existing technique shows that proposed technique is capable of providing better quality stego-images even if the embedded data is slightly more. A 2.7dB increase in PSNR in case of proposed technique substantiates the argument

    Secure Patient Data Transfer Using Information Embedding and Hyperchaos

    No full text
    Health 4.0 is an extension of the Industry standard 4.0 which is aimed at the virtualization of health-care services. It employs core technologies and services for integrated management of electronic health records (EHRs), captured through various sensors. The EHR is processed and transmitted to distant experts for better diagnosis and improved healthcare delivery. However, for the successful implementation of Heath 4.0 many challenges do exist. One of the critical issues that needs attention is the security of EHRs in smart health systems. In this work, we have developed a new interpolation scheme capable of providing better quality cover media and supporting reversible EHR embedding. The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR. The encrypted EHR is reversibly embedded in the cover images produced by the proposed interpolation scheme. The proposed interpolation module has been found to provide better quality interpolated images. The proposed system provides an average peak signal to noise ratio (PSNR) of 52.38 dB for a high payload of 0.75 bits per pixel. In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR. Experimental investigations reveal that our scheme provides improved performance for high contrast medical images (MI) when compared to various techniques for evaluation parameters like imperceptibility, reversibility, payload, and computational complexity. Given the attributes of the scheme, it can be used for enhancing the security of EHR in health 4.0

    SVIoT: A Secure Visual-IoT Framework for Smart Healthcare

    No full text
    The advancement of the Internet of Things (IoT) has transfigured the overlay of the physical world by superimposing digital information in various sectors, including smart cities, industry, healthcare, etc. Among the various shared information, visual data are an insensible part of smart cities, especially in healthcare. As a result, visual-IoT research is gathering momentum. In visual-IoT, visual sensors, such as cameras, collect critical multimedia information about industries, healthcare, shopping, autonomous vehicles, crowd management, etc. In healthcare, patient-related data are captured and then transmitted via insecure transmission lines. The security of this data are of paramount importance. Besides the fact that visual data requires a large bandwidth, the gap between communication and computation is an additional challenge for visual IoT system development. In this paper, we present SVIoT, a Secure Visual-IoT framework, which addresses the issues of both data security and resource constraints in IoT-based healthcare. This was achieved by proposing a novel reversible data hiding (RDH) scheme based on One Dimensional Neighborhood Mean Interpolation (ODNMI). The use of ODNMI reduces the computational complexity and storage/bandwidth requirements by 50 percent. We upscaled the original image from M × N to M ± 2N, dissimilar to conventional interpolation methods, wherein images are upscaled to 2M × 2N. We made use of an innovative mechanism, Left Data Shifting (LDS), before embedding data in the cover image. Before embedding the data, we encrypted it using an AES-128 encryption algorithm to offer additional security. The use of LDS ensures better perceptual quality at a relatively high payload. We achieved an average PSNR of 43 dB for a payload of 1.5 bpp (bits per pixel). In addition, we embedded a fragile watermark in the cover image to ensure authentication of the received content

    An Iterative Filtering Based ECG Denoising Using Lifting Wavelet Transform Technique

    No full text
    This research article explores a hybrid strategy that combines an adaptive iterative filtering (IF) method and the fast discrete lifting-based wavelet transform (LWT) to eliminate power-line noise (PLI) and baseline wander from an electrocardiogram (ECG) signal. Due to its correct mathematical basis and its guaranteed a priori convergence, the iterative filtering approach was preferred over empirical mode decomposition (EMD). The noisy modes generated from the IF are fed to an LWT system so as to be disintegrated into the detail and the approximation coefficients. These coefficients are then scaled using a threshold method to generate a noise-free signal. The proposed strategy improves the quality and allows us to precisely preserve the vital components of the signal. The method’s potency has been established empirically by calculating the improvement in signal-to-noise ratio, cross-correlation coefficient and percent root-mean-square difference for different recordings available on the MIT-BIH arrhythmia database and then compared to numerous existing methods

    Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell

    No full text
    The deployment of Relay Nodes (RNs) in 4G LTE-A networks, mainly originating from the wireless backhaul link, provides an excellent network planning tool to enhance system performance. Better coordination between the base station and relays to mitigate inter-cell interference becomes an important aspect of achieving the required system performance, not only in the single-cell scenario, but also in multi-cell scenarios. In this paper, we model and analyze two basic approaches for designing a 4G LTE-A tri-sectored cellular system. The approaches are based on Antenna Selection Sectored Relaying (ASSR) and Beam Selection Sectored Relaying (BSSR). The main purpose of the proposed schemes is to enhance system performance by improving the quality of the wireless relay backhaul link. In this technique, antenna selection takes into consideration Non-Line-Of-Sight (NLOS) communication, whereas BSSR considers the case of Line-Of-Sight (LOS) communication using heuristic beam forming approach. The resource allocation problem has also been investigated for relay based cooperative LTE-A tri-sectored cell in the downlink. The best possible location for relay node in the sector, power allocation and MIMO channel modeling is formulated as an optimization problem with the aim of maximizing the end to end link rate and the Signal to Interference plus Noise Ratio (SINR) of 4G LTE-A systems. Power allocation/optimization has been solved by means of the duality equation of the stationary Karush-Kuhn-Tucker (KKT) condition and is used to derive optimal values for the beam forming vector on both the relay as well as the access link. The performance of the proposed scheme is verified through simulations carried out using MATLAB software. The simulation results show a significant improvement in the SINR, throughput capacity, and coverage area of the 4G LTE-A cell, while guaranteeing better quality of service. Keywords: Long Term Evolution-Advanced (LTE-A), Relay Node (RN), Sectored Relaying (SR), Antenna Selection Sectored Relaying (ASSR), Beam Selection Sectored Relaying (BSSR), Karush-Kuhn-Tucker (KKT

    Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing

    No full text
    In this paper, we propose an adaptive encryption scheme for color images using Multiple Distinct Chaotic Maps (MDCM) and DNA computing. We have chosen three distinct chaotic maps, including a 2D-Henon map, a Tent map, and a Logistic map, to separately encrypt the red, green, and blue channels of the original image. The proposed scheme adaptively modifies the parameters of the maps, utilizing various statistical characteristics such as mean, variance, and median of the image to be encrypted. Thus, whenever there is a change in the plain image, the secret keys also change. This makes the proposed scheme robust against the chosen and known plaintext attacks. DNA encoding has also been used to add another layer of security. The experimental analysis of the proposed scheme shows that the average value of entropy is approximately eight, the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are 99.61% and 33%, respectively, and correlation coefficients close to zero, making the scheme not only reliable but also resilient against many attacks. Moreover, the use of low-dimensional maps reduces the computational costs of the scheme to a large extent
    corecore